A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1 | patch vendor advisory |
https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7%40redhat.com/T/#u | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14314 | issue tracking third party advisory |
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html | third party advisory mailing list |
https://usn.ubuntu.com/4576-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/4578-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/4579-1/ | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html | third party advisory mailing list |
https://www.starwindsoftware.com/security/sw-20210325-0003/ | third party advisory |